Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack

Posted on June 20, 2025June 20, 2025 By CWS

Apache SeaTunnel, the extensively used distributed information integration platform, has disclosed a major safety vulnerability that permits unauthorized customers to execute arbitrary file learn operations and deserialization assaults via its RESTful API interface. 

The vulnerability, tracked as CVE-2025-32896 and reported on April 12, 2025, impacts a number of variations of the platform and has been labeled with reasonable severity.

Apache SeaTunnel RCE Vulnerability

The safety flaw impacts Apache SeaTunnel variations 2.3.1 via 2.3.10, creating a considerable publicity window for organizations using these variations in manufacturing environments. 

The vulnerability stems from inadequate entry controls within the platform’s RESTful API-v1 implementation, particularly focusing on the /hazelcast/relaxation/maps/submit-job endpoint. 

This endpoint, designed for job submission performance, lacks correct authentication mechanisms, permitting malicious actors to use the system with out legitimate credentials.

Safety researcher Owen Amadeus found and reported this vulnerability, highlighting how unauthorized customers can bypass safety controls to entry delicate system sources. 

The technical nature of this flaw includes the manipulation of MySQL connection parameters, the place attackers can inject malicious payloads via URL parameters to realize their aims. 

This assault vector is especially regarding as a result of it combines two vital safety dangers: arbitrary file entry and deserialization vulnerabilities, which may result in distant code execution eventualities.

The exploitation mechanism facilities across the manipulation of database connection strings throughout the SeaTunnel job submission course of. 

Attackers can craft specifically designed MySQL URLs containing further parameters that set off each arbitrary file learn operations and Java deserialization assaults. The susceptible endpoint /hazelcast/relaxation/maps/submit-job processes these malicious requests with out correct validation or authentication checks.

The deserialization part of this assault is especially harmful, as it will possibly permit attackers to execute arbitrary code on the goal system.

By submitting crafted serialized objects via the job submission interface, malicious actors can probably achieve full management over the affected SeaTunnel occasion. 

Any such vulnerability exploits Java’s object serialization mechanism, the place untrusted information may be deserialized into executable code, bypassing conventional safety boundaries.

Danger FactorsDetailsAffected ProductsApache SeaTunnel variations 2.3.1 via 2.3.10ImpactRemote Code Execution (RCE)Exploit Stipulations– Community entry to SeaTunnel instance- API-v1 enabled (default)- Absence of HTTPS two-way authenticationCVSS 3.1 Score8.2 (Excessive)

Remediation Steps

The Apache SeaTunnel improvement crew has addressed this vulnerability in model 2.3.11, implementing complete safety enhancements to stop unauthorized entry. 

Organizations working affected variations ought to instantly improve to the newest launch to mitigate potential safety dangers. The repair consists of enhanced authentication mechanisms and enter validation procedures.

Past model upgrades, directors are strongly suggested to implement further safety measures. 

The Apache crew recommends enabling RESTful API-v2 performance, which incorporates improved safety controls and authentication frameworks. 

Moreover, implementing HTTPS two-way authentication gives a further safety layer by making certain mutual certificates validation between shoppers and servers.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Apache, Attack, Deserialization, Perform, SeaTunnel, Unauthorized, Users, Vulnerability

Post navigation

Previous Post: Cloudflare Tunnels Abused in New Malware Campaign
Next Post: Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

Related Posts

IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
  • Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
  • SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
  • Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
  • SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News